Lucene search

K
githubGitHub Advisory DatabaseGHSA-3HWC-RQWP-V36Q
HistoryFeb 09, 2024 - 6:31 p.m.

Apache Solr can leak certain passwords due to System Property redaction logic inconsistencies

2024-02-0918:31:07
CWE-522
GitHub Advisory Database
github.com
4
apache solr
information leakage
vulnerability
sensitive system properties
authorization
configuration
upgrade
redaction logic

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.4%

Insufficiently Protected Credentials vulnerability in Apache Solr.

This issue affects Apache Solr from 6.0.0 through 8.11.2, from 9.0.0 before 9.3.0.
One of the two endpoints that publishes the Solr processā€™ Java system properties, /admin/info/properties, was only setup to hide system properties that had ā€œpasswordā€ contained in the name.
There are a number of sensitive system properties, such as ā€œbasicauthā€ and ā€œaws.secretKeyā€ do not contain ā€œpasswordā€, thus their values were published via the ā€œ/admin/info/propertiesā€ endpoint.
This endpoint populates the list of System Properties on the home screen of the Solr Admin page, making the exposed credentials visible in the UI.

This /admin/info/properties endpoint is protected under the ā€œconfig-readā€ permission.
Therefore, Solr Clouds with Authorization enabled will only be vulnerable through logged-in users that have the ā€œconfig-readā€ permission.
Users are recommended to upgrade to version 9.3.0 or 8.11.3, both of which fix the issue.
A single option now controls hiding Java system property for all endpoints, ā€œ-Dsolr.hiddenSysPropsā€.
By default all known sensitive properties are hidden (including ā€œ-Dbasicauthā€), as well as any property with a name containing ā€œsecretā€ or ā€œpasswordā€.

Users who cannot upgrade can also use the following Java system property to fix the issue:
Ā  -Dsolr.redaction.system.pattern=.*(password|secret|basicauth).*

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.4%